Purpose
Drawing on the control agency theory and the network effect theory, the purpose of this paper is to examine the effect of privacy assurance approaches, network externality and technology ...complementarity on consumers’ self-disclosure in mobile payment (MP) applications. The authors identify four types of privacy assurance approaches: perceived effectiveness of privacy setting, perceived effectiveness of privacy policy, perceived effectiveness of industry self-regulation and perceived effectiveness of government legislation. The research model considers how these privacy assurance approaches influence privacy concerns and consumers’ self-disclosure in MP applications under boundary conditions of network externality and technology complementarity.
Design/methodology/approach
An online survey with 647 sample users was conducted to empirically validate the model. The target respondents were current consumers of a popular MP application. The empirical data were analyzed by a structural equation modeling approach.
Findings
The empirical results reveal several major findings. First, privacy assurance approaches can effectively decrease privacy concerns, which ultimately formulates consumers’ self-disclosure in MP applications. Second, network externality and technology complementarity weaken the effect of perceived effectiveness of privacy setting on privacy concerns. Third, network externality and technology complementarity strengthen the relationship between perceived effectiveness of government legislation and privacy concerns, while they have non-significant interaction effect with perceived effectiveness of privacy policy and industry self-regulation on privacy concerns.
Practical implications
MP providers and stakeholders can harness the efficacy of privacy assurance approaches in alleviating privacy concerns and promoting consumers’ self-disclosure in MP applications.
Originality/value
The authors’ work contributes to the information privacy literature by identifying effective privacy assurance approaches in promoting consumers’ self-disclosure in MP applications, and by highlighting boundary conditions of these privacy assurance approaches.
With the prevalence of the Internet, it has become increasingly easy and common for students to seek information from various online sources. Wikipedia is one of the largest and most popular ...reference websites that university students may heavily rely on in completing their assignments and other course‐related projects. Based on the information adoption model, this study empirically examines the effects of trust and information usefulness on Hong Kong students' information adoption from Wikipedia. We conducted an online survey and analysed the responses using partial least squares. Overall, the model explained 69.4% of the variance in information adoption, 59.1% of the variance in trust and 62.7% of the variance in information usefulness. Interestingly, deviating significantly from the information adoption model, trust played a major role in determining information adoption and fully mediated the relationship between information usefulness and information adoption. The implications of this study will provide important insights to both researchers and practitioners.
Practitioner Notes
What is already known about this topic
Current controversy is perpetuated by the use of Wikipedia in academic work, although it is heavily utilised by university students.
Information adoption is solely determined by information usefulness as proposed in Sussman and Siegal's information adoption model.
Prior studies on trust in online information environment primarily focused on issues such as security, technical reliability or e‐commerce.
What this paper adds
This study provides preliminary empirical evidence regarding university students' motivations behind the use of Wikipedia.
Trust towards Wikipedia mediates the relationship between information usefulness and information adoption.
Completeness and format of online information determine university students' perceptions of information usefulness.
Implications for practice and/or policy
Educators should provide university students with more training on evaluating online information and instruct them to be critical learners.
Academic institutions should not simply prohibit the use of Wikipedia but instead incorporate it into the curriculum to develop students' digital literacy.
The administrators of online educational reference websites should create a reputation system and increase the completeness and format of information.
PurposeThis paper reports the panel discussion on the topic of artificial intelligence (AI) and robots in our lives. This discussion was held at the Digitization of the Individual (DOTI) workshop at ...the International Conference on Information Systems in 2019. Three scholars (in alphabetical order: Ting-Peng Liang, Lionel Robert and Suprateek Sarker) who have done AI- and robot-related research (to varying degrees) were invited to participate in the panel discussion. The panel was moderated by Manuel Trenz.Design/methodology/approachThis paper introduces the topic, chronicles the responses of the three panelists to the questions the workshop chairs posed and summarizes their responses, such that readers can have an overview of research on AI and robots in individuals' lives and insights about future research directions.FindingsThe panelists discussed four questions with regard to their research experiences on AI- and robot-related topics. They expressed their viewpoints on the underlying nature, potential and effects of AI in work and personal life domains. They also commented on the ethical dilemmas for research and practice and provided their outlook for future research in these emerging fields.Originality/valueThis paper aggregates the panelists' viewpoints, as expressed at the DOTI workshop. Crucial ethical and theoretical issues related to AI and robots in both work and personal life domains are addressed. Promising research directions to these cutting-edge research fields are also proposed.
Given the intense competition in the mobile payment market, researchers have been exploring strategies to maintain brand equity and consumer loyalty. By considering the characteristics of mobile ...payment, we incorporate cross-side network effects (CNEs) and the complementarity actions (i.e., platform-application, application-service, and service-strategy complementarities) to examine mobile payment brand equity and consumer loyalty. We test the research model using survey data collected from Alipay Wallet (n = 647) and WeChat Wallet (n = 327). The results show that platform-application, application-service, and service-strategy complementarities positively influence brand equity, which in turn leads to consumer loyalty. In addition, service-strategy complementarity reinforces the impacts of platform-application and application-service complementarities on brand equity. This study contributes to the literature by introducing CNEs in the mobile payment context and examining the relations between CNEs, brand equity, and consumer loyalty. Furthermore, the results provide practitioners with insights into consumer loyalty in the mobile payment context.
Obsessive online social gaming has become a worldwide societal challenge that deserves more scholarly investigation. However, this issue has not received much attention in the information systems ...(IS) research community. Guided by dual-system theory, we theoretically derive a typology of obsessive technology use and contextually adapt it to conceptualize obsessive online social gaming. We also build upon identity theory to develop a dual-identity perspective (i.e., IT identity and social identity) of obsessive online social gaming. We test our research model using a longitudinal survey of 627 online social game users. Our results demonstrate that the typology of obsessive technology use comprises four interrelated types: impulsive use, compulsive use, excessive use, and addictive use. IT identity positively affects the four obsessive online social gaming archetypes and fully mediates the effect of social identity on obsessive online social gaming. The results also show that IT identity is predicted by embeddedness, self-efficacy, and instant gratification, whereas social identity is determined by group similarity, group familiarity, and intragroup communication. Our study contributes to the IS literature by proposing a typology of obsessive technology use, incorporating identity theory to provide a contextualized explanation of obsessive online social gaming and offering implications for addressing the societal challenge.
Purpose
Drawing on the social learning theory, the purpose of this paper is to examine the antecedents and consequences of users’ excessive online social gaming. Specifically, the authors develop a ...model to propose that observational learning and reinforcement learning mechanisms together determine excessive online social gaming, which further foster adverse consequences.
Design/methodology/approach
The model is empirically validated by a longitudinal survey among users of a popular online social game: Arena of Valor. The empirical data are analyzed using component-based structural equation modeling approach.
Findings
The empirical results offer two key findings. First, excessive online social gaming is determined by observational learning factors, i.e. social frequency and social norm, and reinforcement learning factors, i.e. perceived enjoyment and perceived escapism. Second, excessive online social gaming leads to three categories of adverse consequences: technology-family conflict, technology-work conflict and technology-person conflict. Meanwhile, technology-family conflict and technology-work conflict further foster technology-person conflict.
Originality/value
This study contributes to the literature by developing a nomological framework of excessive online social gaming and by extending the social learning theory to excessive technology use.
The current COVID-19 crisis has seen governments worldwide mobilising to develop and implement contact-tracing apps as an integral part of their lockdown exit strategies. The challenge facing policy ...makers is that tracing can only be effective if the majority of the population uses the one app developed; its specifications must therefore be carefully considered. We theorise on tracing apps and mass acceptance and conduct a full-factorial experiment to investigate how app installation intention is influenced by different app specifications based on three benefit appeals, two privacy designs, and two convenience designs. By applying quantile regression, we not only estimate the general effect of these app specifications but also uncover how their influence differs among citizens with different propensities for acceptance (i.e. critics, undecided, advocates) - a crucial insight for succeeding with mass acceptance. This study contributes to research in three ways: we theorise how mass acceptance differs from established app acceptance, we provide a fine-grained approach to investigating the app specifications salient for mass acceptance, and we reveal contextualised insights specific to tracing apps with multi-layered benefit structures. Our findings can guide policy makers by providing specification recommendations for facilitating mass acceptance of tracing apps during pandemics or other societal crises.
•The use of social media (e.g., instant messaging) is conceptualized as an intentional social action with collective intention as the focus of interest.•A collective intention-based research model is ...developed based on critical mass theory and social influence processes.•Perceived critical mass influences usage we-intention both directly and indirectly through group norm and social identity.
The increasing popularity of Web 2.0 has dramatically changed the way in which people communicate with others in their daily life or work. However, the use of social media is fundamentally different from that of traditional information technologies. Specifically, it requires collective efforts and interdependence between two or more people, and thus the usage behavior is no longer an individual's own decision or plan. Built on critical mass theory and social influence processes, this study tries to make an attempt to understand the determinants of collective intention (we-intention), which represents one's perception of a group of people acting as a unit. Instant messaging, one of the most popular social media platforms, has been chosen for investigation, and findings from a survey showed that perceived critical mass influenced we-intention both directly and indirectly through group norm and social identity. Recognizing the importance and relevance of collective intention will advance current understanding beyond individual intention-based models which are widely adopted in prior IS research. This study may be limited by having not included other alternative social technologies, but we leave this work for future research.
Online impulse buying has drawn increasing scholarly attention across disciplines. However, little effort has been made to evaluate the status of research and consolidate the findings in the ...literature. To address this research gap, we conducted a systematic review of studies of online impulse buying, and used the Stimulus–Organism–Response (SOR) framework to identify and classify the factors that affect online impulse buying. We then built a conceptual framework to explain the interrelationships between the three key elements of online impulse buying. Finally, we discussed the future research directions and implications for research.